0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (79)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Recommender System with Machine Learning and Artificial Intelligence - Practical Tools and Applications in Medical,... Recommender System with Machine Learning and Artificial Intelligence - Practical Tools and Applications in Medical, Agricultural and Other Industries (Hardcover)
Sachi Nandan Mohanty, Jyotirmoy Chatterjee, Sarika Jain, Ahmed A. Elngar, Priya Gupta
R4,772 Discovery Miles 47 720 Ships in 7 - 11 working days

This book is a multi-disciplinary effort that involves world-wide experts from diverse fields, such as artificial intelligence, human computer interaction, information technology, data mining, statistics, adaptive user interfaces, decision support systems, marketing, and consumer behavior. It comprehensively covers the topic of recommender systems, which provide personalized recommendations of items or services to the new users based on their past behavior. Recommender system methods have been adapted to diverse applications including social networking, movie recommendation, query log mining, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. Recommendations in agricultural or healthcare domains and contexts, the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. This book illustrates how this technology can support the user in decision-making, planning and purchasing processes in agricultural & healthcare sectors.

Designing Security Architecture Solutions (Paperback): Jay Ramachandran Designing Security Architecture Solutions (Paperback)
Jay Ramachandran
R1,666 R1,136 Discovery Miles 11 360 Save R530 (32%) Ships in 10 - 15 working days

The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security architecture from a software engineering perspective. He explains why strong security must be a guiding principle of the development process and identifies a common set of features found in most security products, explaining how they can and should impact the development cycle. The book also offers in-depth discussions of security technologies, cryptography, database security, application and operating system security, and more.

Principles of Information Security (Paperback, 6th edition): Herbert Mattord, Michael Whitman Principles of Information Security (Paperback, 6th edition)
Herbert Mattord, Michael Whitman
R914 R785 Discovery Miles 7 850 Save R129 (14%) Ships in 15 - 25 working days

Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.

Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition)
Mark Ciampa
R747 R642 Discovery Miles 6 420 Save R105 (14%) Ships in 15 - 25 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

The Truth Machine - The Blockchain and the Future of Everything (Paperback): Paul Vigna, Michael J. Casey The Truth Machine - The Blockchain and the Future of Everything (Paperback)
Paul Vigna, Michael J. Casey 1
R389 R322 Discovery Miles 3 220 Save R67 (17%) Ships in 7 - 11 working days
Hands-On Smart Contract Development with Solidity and Ethereum - From Fundamentals to Deployment (Paperback): Kevin Solorio,... Hands-On Smart Contract Development with Solidity and Ethereum - From Fundamentals to Deployment (Paperback)
Kevin Solorio, Randall Kanna, David H Hoover
R1,217 R933 Discovery Miles 9 330 Save R284 (23%) Ships in 7 - 11 working days

Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum-the open source blockchain-based distributed computing platform. You'll get up to speed with the fundamentals and quickly move into builder mode. Kevin Solorio, Randall Kanna, and Dave Hoover show you how to create and test your own smart contract, create a frontend for users to interact with, and more. It's the perfect resource for people who want to break into the smart contract field but don't know where to start. In four parts, this book helps you: Explore smart contract fundamentals, including the Ethereum protocol, Solidity programming language, and the Ethereum Virtual Machine Dive into smart contract development using Solidity and gain experience with Truffle framework tools for deploying and testing your contracts Use Web3 to connect your smart contracts to an application so users can easily interact with the blockchain Examine smart contract security along with free online resources for smart contract security auditing

Gut gerustet gegen UEberwachung im Web - Wie Sie verschlusselt mailen, chatten und surfen (German, Paperback): Johanna C.... Gut gerustet gegen UEberwachung im Web - Wie Sie verschlusselt mailen, chatten und surfen (German, Paperback)
Johanna C. Czeschik, Matthias Lindhorst, Roswitha Jehle
R297 Discovery Miles 2 970 Ships in 10 - 15 working days

Schnelle und einfache Schutzmassnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie mochten nicht, dass jemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten ausspaht? Wie leicht es fur Angreifer ist, Ihre Daten im Internet abzufangen, aber auch mit welchen einfachen Massnahmen Sie sich dagegen schutzen konnen, erfahren Sie in diesem Buch. Zum Einsatz kommt dabei uberwiegend Open-Source-Software, die nicht nur kostenlos, sondern in der Regel sogar sicherer als kommerzielle Losungen ist. Neben leicht nachvollziehbaren Schritt-fur-Schritt-Anleitungen erhalten Sie viele praktische Tipps fur bessere Passworter und den Umgang mit sensiblen Daten. Die notwendigen technischen Grundlagen werden leicht verstandlich und mithilfe vieler Abbildungen erklart. Fangen Sie mit diesem Buch an, Ihre digitale Privatsphare zuruckzuerobern! Sie erfahren unter anderem, wie Sie Ihren Browser sicherer machen und anonym uber das Tor-Netzwerk surfen. welche Vor- und Nachteile die verschiedenen Mailprogramme haben. wie Sie Ihre E-Mails mit PGP oder S/MIME ganz einfach verschlusseln. welche Alternativen zu WhatsApp, Skype & Co. es gibt.

Blockchain fur Dummies (German, Paperback, 2. Auflage): Tiana Laurence Blockchain fur Dummies (German, Paperback, 2. Auflage)
Tiana Laurence; Translated by Isolde Kommer
R559 R519 Discovery Miles 5 190 Save R40 (7%) Ships in 10 - 15 working days
Computer Security and Penetration Testing (Paperback, 2nd edition): Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA Computer Security and Penetration Testing (Paperback, 2nd edition)
Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA
R1,134 R957 Discovery Miles 9 570 Save R177 (16%) Ships in 15 - 25 working days

Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day - readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R2,705 R2,261 Discovery Miles 22 610 Save R444 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

CompTIA A+ Certification All-in-One For Dummies (Paperback, 5th Edition): Glen E. Clarke, Edward Tetz, Timothy L. Warner CompTIA A+ Certification All-in-One For Dummies (Paperback, 5th Edition)
Glen E. Clarke, Edward Tetz, Timothy L. Warner
R1,149 R945 Discovery Miles 9 450 Save R204 (18%) Ships in 7 - 11 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

Elements of Cloud Storage Security - Concepts, Designs and Optimized Practices (Paperback, 1st ed. 2016): Tatiana Galibus,... Elements of Cloud Storage Security - Concepts, Designs and Optimized Practices (Paperback, 1st ed. 2016)
Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas
R1,827 Discovery Miles 18 270 Ships in 7 - 11 working days

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.

Introduction to Cryptography (Hardcover): Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat Introduction to Cryptography (Hardcover)
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
R3,541 Discovery Miles 35 410 Ships in 10 - 15 working days

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.

Cryptanalysis (Paperback): Helen Fouche Gaines Cryptanalysis (Paperback)
Helen Fouche Gaines
R216 R205 Discovery Miles 2 050 Save R11 (5%) Ships in 10 - 15 working days

Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers and more. Simple and advanced methods. 166 specimens to solve-with solutions.

Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4,... Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings (Paperback, 2012)
Ram Ramanujam, Srini Ramaswamy
R1,648 R1,387 Discovery Miles 13 870 Save R261 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, held in Bhubaneswar, India, in February 2012. The 17 full papers presented together with 15 short papers in this volume were carefully reviewed and selected from 89 submissions. In addition the book contains the full versions of 6 invited talks. The papers range over a spectrum of issues related to the theme, covering theoretical foundations, computational tools, and societal applications. State of the art techniques like game theoretic ones are used by authors for analyzing conceptual problems.

Applications of Secure Multiparty Computation (Hardcover): Peeter Laud, Liina Kamm Applications of Secure Multiparty Computation (Hardcover)
Peeter Laud, Liina Kamm
R2,360 Discovery Miles 23 600 Ships in 10 - 15 working days
Topics in Cryptology -- CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA,... Topics in Cryptology -- CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings (Paperback, Edition.)
Aggelos Kiayias
R2,381 Discovery Miles 23 810 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.

Crypto Economy - How Blockchain, Cryptocurrency, and Token-Economy Are Disrupting the Financial World (Hardcover): Aries Wanlin... Crypto Economy - How Blockchain, Cryptocurrency, and Token-Economy Are Disrupting the Financial World (Hardcover)
Aries Wanlin Wang
R473 R441 Discovery Miles 4 410 Save R32 (7%) Ships in 7 - 11 working days

In late 2008, under the long shadow cast by the most severe economic crisis in generations, a revolutionary new form of currency was quietly being shaped. At the time no one could have predicted that an obscure form of electronic money would in less than a decade prove to be the most important financial innovation of the 21st century-a tool that would spark an entire new economic institution: crypto economy. That once-obscure money was known as Bitcoin, and today it is the highest valued digital coin. And though consumers continue to scramble to cash in on the trending currency, the technology behind Bitcoin known as Blockchain, which allows the currency to bought and sold without regulation by a government, remains a mystery to the public. In Crypto Economy, Aries Wanlin Wang provides the definitive blueprint for understanding how Bitcoin, Blockchain, and other digital technologies are disrupting traditional financial institutions and forever changing the world of commerce.

Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April... Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings (Paperback, 2009 ed.)
Marc Fischlin
R2,803 Discovery Miles 28 030 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.

The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults.

Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition): Dan Shoemaker Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition)
Dan Shoemaker
R1,041 R883 Discovery Miles 8 830 Save R158 (15%) Ships in 15 - 25 working days

CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

Secure Computer and Network Systems - Modeling, Analysis and Design (Hardcover): Nong Ye Secure Computer and Network Systems - Modeling, Analysis and Design (Hardcover)
Nong Ye
R2,697 R2,551 Discovery Miles 25 510 Save R146 (5%) Ships in 10 - 15 working days

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.

This book presents quantitative modeling and analysis techniques to address these numerous challenges in cyber attack prevention and detection for security and QoS, including:

the latest research on computer and network behavior under attack and normal use conditions;

new design principles and algorithms, which can be used by engineers and practitioners to build secure computer and network systems, enhance security practice and move to providing QoS assurance on the Internet;

mathematical and statistical methods for achieving the accuracy and timeliness of cyber attack detection with the lowest computational overhead;

guidance on managing admission control, scheduling, reservation and service of computer and network jobs to assure the service stability and end-to-end delay of those jobs even under Denial of Service attacks or abrupt demands.

"Secure Computer and Network Systems: Modeling, Analysis and Design" is an up-to-date resource for practising engineers and researchers involved in security, reliabilityand quality management of computer and network systems. It is also a must-read for postgraduate students developing advanced technologies for improving computer network dependability.

Information Systems Security (Paperback): Michael G. Solomon, Mike Chapple Information Systems Security (Paperback)
Michael G. Solomon, Mike Chapple
R4,301 Discovery Miles 43 010 Ships in 10 - 15 working days

A Comprehensive Survey Of The Most Current And Critical Information Security Practices, Information Security Illuminated Is An Excellent Introduction To The Fundamental Concepts And Applications For Students And Professionals Alike. Key Security Concepts Are Discussed With Clear, Accessible Language And Reinforced By A Large Number Of Scenario-Based Exercises And Practical Review Questions. Readers Are Then Able To Apply Their Knowledge Through Hands-On Experience With Computer Security-Related Tools. Coverage Begins With The Basics Of Computer Security (CIA And DAD Triads, Risk Analysis, Etc.), And Moves Quickly Through To Important, Real-World Topics Such As Access Control Methodologies, Security Principles And Practices, Business Continuity Planning And Disaster Recovery, Firewalls, Incident Handling, And Much More. In Addition To Providing The Requisite Material For A Complete Course In Information Security Practices, The Book Can Be Used As A Self-Study Guide For Many Of The Basic Security Certifications.

Grokking Bitcoin (Paperback): Kalle Rosenbaum Grokking Bitcoin (Paperback)
Kalle Rosenbaum; Foreword by David A. Harding
R849 R645 Discovery Miles 6 450 Save R204 (24%) Ships in 10 - 15 working days

If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership.

With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain.

Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.

Practical Cryptography (Paperback): Niels Ferguson, Bruce Schneier Practical Cryptography (Paperback)
Niels Ferguson, Bruce Schneier
R908 R644 Discovery Miles 6 440 Save R264 (29%) Ships in 10 - 15 working days

Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition): William Stallings Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition)
William Stallings
R1,434 Discovery Miles 14 340 Ships in 10 - 15 working days

For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material - including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,051 Discovery Miles 30 510
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
Tribe of Hackers Red Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R496 R371 Discovery Miles 3 710
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
Studies in Complexity and Cryptography…
Oded Goldreich Paperback R2,232 Discovery Miles 22 320
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
Investigating Cryptocurrencies…
Nick Furneaux Paperback R1,205 R829 Discovery Miles 8 290

 

Partners